1. Introduction
In recent times, rapid developments in technology have increased the rate of cyberattacks and cybercrimes on cyber-physical systems and institutions. Infrastructural security against these cyberattacks and cybercrimes have become increasingly important to individuals, organizations, and research centers. In a 2016 Global Economic Crime survey, cybercrime was ranked as the fourth most reported economic crime in South Africa, and the rate increased from 26% to 32% when compared to the reported cases in 2014 [
1]. With regards to power systems and the electricity grid, the integration of the Internet of Things (IoT) and other technological tools have assisted in promoting grid efficiency and effectiveness. However, just like other important infrastructures, a plethora of new security concerns, such as cyberattacks, are becoming rampant on the power grid [
2]. Moreover, the fact that the power grid is a vital asset among the country’s various infrastructures makes it a highly attractive target for cyber-threats [
2,
3]. In the 2014 fiscal year, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) announced that 79 of the 245 recorded cyber incidents on critical infrastructures targeted the energy sector [
4]. Severe cyberattack examples, such as the Ukrainian power grid blackout in 2015 and the Israeli power grid in 2016, have shown that grid cyber-security is among the top priorities of national security [
3,
5]. Studies have shown that supervisory control and data acquisition (SCADA) systems, and other operational modules, including the State Estimation, Optimal Power Flow (OPF) can be successfully attacked [
6,
7,
8]. Intruders take advantages of the various vulnerabilities in the grid network and modules to disrupt grid operation and stability, thereby causing blackouts and economic loss. These security issues have continuously necessitated attention from power system engineers and researchers into developing solutions.
Intruder detection schemes have been identified as a security solutions for power systems [
3,
9]. Intrusion detection systems (IDSs) in network processes aim to monitor, analyze, and react to any unauthorized and anomalous deviation from the normal profile of the network. Monitoring power system networks and module results in order to predict and detect intrusion and anomalies into the grid topology, database, and network data by adversaries is highly important for a reliable power system network. In recent times, various studies have proposed several formulations that focus on intrusion and anomaly detection for power systems [
10,
11,
12,
13,
14,
15]. The authors in [
9,
10] proposed an anomaly detection and correlation algorithm for substation cybersecurity using test systems as case studies. Further, machine learning techniques have been proposed as a viable option, as they are known to show tremendous performance in intrusion detections because of their accurate pattern recognition and learning abilities [
16,
17,
18]. The authors in [
16] ascertained that the machine learning approach is applicable to power system security. The authors successfully applied machine learning algorithms, including OneR, random forest, and Adaboost+JRipper, in classifying power system disturbances over a three-class (Attack, Natural Disturbance, and No Event) scheme. The authors in [
18] developed different multi-model algorithms in order to find the best performer for voltage security monitoring and assessment. The authors used the IEEE 96 reliability test system as a case study and presented Random Forest as the best performer, with an accuracy of 99.89%. The authors in [
19] proposed an artificial neural network algorithm (ANN) to detect power system cyberattacks on transmission network data. The authors evaluated their experiments on a 24-bus system and achieved a detection rate of 92–99.5% on the introduced anomalies. However, the consideration of scalability, demand, and generation uncertainty, which are highly common for power systems, were not considered. Further, the authors in [
17] used some machine learning algorithms, involving a convolutional neural network, K-nearest neighbor, and XGBoost, to analyze raw data logs collected by phasor measurement units (PMUs) to detect intrusion into power systems. The authors achieved an average accuracy, precision, recall and F1 score of 0.9391, 0.938, 0.936, and 0.935 on 15 datasets, respectively. The authors in [
2] also presented an IDS based on principal component analysis (PCA), whereby flow results are monitored and intrusion due to cyberattacks on transmission line parameters are detected. The authors used PCA to separate power flow variability into regular and irregular subspaces. They verified the performance of their algorithm using IEEE 24-bus and 118-bus reliability test systems and achieved good results. However, intrusions on several other input data such as the load, generator inputs, and network topology were not considered in their work. Furthermore, the authors in [
20] presented a graph matching approach for power systems. The authors used IEEE 24-bus, 30-bus, and 118-bus benchmark test systems to implement their proposed scheme and achieved perfect scores. However, the proposed algorithm only considered the topological and configurational aspect of the power system database; intrusions into the power flow analysis were not considered.
We sought to improve the shortcomings in the above-mentioned literature, such as scalability, demand, and generation uncertainty, and topological and configurational intrusion of the power system. In this paper, a hybrid Support Vector Machine and Multilayer Perceptron Neural Network (SVMNN) algorithm, which involves a combination of Support Vector Machine (SVM) and feedforward Multilayer Perceptron Neural Network (MPLNN) algorithms, is developed for predicting and detecting power system cyber intrusion attacks. The key idea is to take advantage of two distinguished classifiers’ abilities for predicting and detecting attacks on power systems. The logistic regression method is developed for the stacking process. The hybrid algorithm is modelled to evaluate a case study involving a 24-bus system AC power flow result dataset. This study made use of a real time generator and load data injections that showed the nonlinearity and uncertainty properties peculiar to power systems. Daily generator output profiles for a duration of twenty one (21) days and a load profile taken at an interval of thirty (30) minutes were used. The hypothesis is that at the end of each day, there will be ten (10) intrusive events involving simultaneous attacks, as described in [
9]. The hypothesis of ten daily intrusive events was considered in order to have a balanced dataset for the prediction and detection algorithm. Feedforward MLPNN are known for their excellent learning abilities, especially in non-linear complex relationships and their good classification performance. With regards to its well-known flaw of non-optimal separation surfaces between classes, here, MLPNN is stacked with SVM, which is excellent in that regard. Further, unlike previous studies, the proposed scheme in this paper considered intrusions that affect the topological configuration, as well as intrusions on the load and generator output injections. High efficiency in precision and accuracy were achieved using the proposed scheme.
The specific novelties of this paper are stated briefly: (1) a description of power system cyber intrusion scenarios, involving topological modification and polluted data using a bus test system as a case study; (2) evaluating the effects of cyber intrusions on the AC power flow result of OPF and its relevant influences on voltage, power, and current flows; (3) load flow analysis using modified power system data and integrating various attack scenarios involving topological manipulation and load/generator injections; and (4) developing an effective hybrid scheme that involves taking advantage of two distinguished classifiers’ abilities to evaluate the bus voltage dataset generated from the load flow results.
In this paper, two test bus systems were used as case studies. A modified IEEE Garver 6 bus test system was used in describing cyber intrusion scenarios, whereas a 24-bus system was used as the case study for the hybrid SVMNN prediction and detection scheme. The developed SVMNN algorithm presented 99.6% precision and accuracy rates in predicting and detecting the introduced attacks, which demonstrated the efficacy of the model in predicting and detecting both topological configurational intrusion as well as intrusions into the generator and load injections. All the simulations to generate the bus voltage dataset were conducted using the Electrical Transient Analyzer Program (ETAP) software. The ETAP was used to run the AC OPF processes, and the machine learning algorithms were designed, tested and evaluated using the Orange machine learning tool.
The rest of this paper is organized as follows.
Section 2 presents the Materials and Methods while
Section 3 presents the results and discussions.
Section 4 presents the conclusions and recommendation for future work.